By Topic

IEEE Pervasive Computing

Issue 3 • July-Sept. 2008

Filter Results

Displaying Results 1 - 23 of 23
  • [Front cover]

    Publication Year: 2008, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (482 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2008, Page(s):c2 - 1
    Request permission for commercial reuse | PDF file iconPDF (1396 KB)
    Freely Available from IEEE
  • The Seeds of Inspiration

    Publication Year: 2008, Page(s):2 - 3
    Request permission for commercial reuse | PDF file iconPDF (87 KB) | HTML iconHTML
    Freely Available from IEEE
  • Hacked Devices, A New Game Experience, and a Wi-Fi Detector Shirt

    Publication Year: 2008, Page(s):4 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (938 KB) | HTML iconHTML

    The article covers several hacks for devices, new and old, and a couple of things that should appeal to the hacker tradition: the jDome game and a Wi-Fi detector shirt. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Whither Bluetooth?

    Publication Year: 2008, Page(s):6 - 8
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (324 KB) | HTML iconHTML

    Almost all smart phones sold today include Bluetooth-a short-range, low-power radio technology first introduced in the late 1990s. Bluetooth-enabled accessories for phones-in particular, hands-free headsets-are also quite popular. In the less than 10 years, since version 1.0 of the Bluetooth specification was published, nearly 2 billion Bluetooth products have shipped. Here, we take a look at some... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Pervasive Computing Call for Papers

    Publication Year: 2008, Page(s): 9
    Request permission for commercial reuse | PDF file iconPDF (1008 KB)
    Freely Available from IEEE
  • Why Consumers (Don't) Adopt Smart Wearable Electronics

    Publication Year: 2008, Page(s):10 - 12
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (279 KB) | HTML iconHTML

    This research examines various factors affecting consumer adoption of a smart wearable electronics product, specifically an iPod jacket. The results indicate that consumers find convenience and compatibility the most important adoption factors while observability and perceived social prestige are the least important. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hacking Is Pervasive

    Publication Year: 2008, Page(s):13 - 15
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1186 KB) | HTML iconHTML

    A true hacker is an individual who can achieve miracles by appropriating, modifying, or "kludging" existing resources (devices, hardware, software, or anything within reach) to suit other purposes, often in an ingenious fashion. Gifted hackers can be thought of as transmutation or collage artists. They take everything from streamlined commercial products to bits of junk as their raw materials, lev... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hacking in Industrial Research and Development

    Publication Year: 2008, Page(s):16 - 23
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1888 KB) | HTML iconHTML

    Incorporating off-the-shelf devices and technology can reduce the risk, cost, and deployment time of a product's field trials. Two case studies demonstrate hacking's contribution to industrial R&D in commercial settings. The first case study evaluates optical and radio frequency techniques to track shopping carts in a supermarket. The other evaluates the deployment of a handheld device to enab... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Engineered Reality: Prototyping Inventions for Television

    Publication Year: 2008, Page(s):24 - 31
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2544 KB) | HTML iconHTML

    Invention has always made popular television, and the advent of reality TV, along with advances in rapid prototyping technology, has made it possible to design and create inventions in front of the camera. There is also growing interest in producing TV that attracts home viewers who are, or aspire to be, hackers. The authors describe their experiences making a cable TV show in which each episode i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Solder's Tale: Putting the "Lead" Back in "Lead Users"

    Publication Year: 2008, Page(s):32 - 38
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1932 KB) | HTML iconHTML

    A composer's view of the history of hardware hacking, contrasting the aesthetic implications of circuitry and software. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hacking the Nintendo Wii Remote

    Publication Year: 2008, Page(s):39 - 45
    Cited by:  Papers (149)  |  Patents (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2282 KB) | HTML iconHTML

    Since its introduction, the Nintendo Wii remote has become one of the world's most sophisticated and common input devices. Combining its impressive capability with a low cost and high degree of accessibility make it an ideal platform for exploring a variety of interaction research concepts. The author describes the technology inside the Wii remote, existing interaction techniques, what's involved ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hacking, Mashing, Gluing: Understanding Opportunistic Design

    Publication Year: 2008, Page(s):46 - 54
    Cited by:  Papers (30)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1910 KB) | HTML iconHTML

    Opportunistic practices can accelerate and simplify ubiquitous computing systems design. Such practices may include copying and pasting code from online forums into one's own scripts or reappropriating components from consumer electronics for design prototypes. The authors introduce a framework that links opportunistic design for ubiquitous computing to hardware and software practices. They interv... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Chumby: An Experiment in Hackable Pervasive Computing

    Publication Year: 2008, Page(s):55 - 62
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (976 KB) | HTML iconHTML

    As computers become more pervasive, they become more personal. The ultimate pervasive computer would be as unique as the individual it serves. Unfortunately, consumer products are typically closed to protect the manufacturer's intellectual property - a policy choice that hampers user's ability to customize products to fit their unique environments. The chumby is a pervasive computing device and no... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Kent Farnsworth on His Father's Electronic Television and Fusion Research

    Publication Year: 2008, Page(s):63 - 65
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (566 KB) | HTML iconHTML

    On 7 September 1927, Philo Taylor Farnsworth demonstrated the first all-electronic dissection and reconstruction of a television image, laying the foundation for the television revolution. In this interview with Kent Farnsworth, one of Philo's surviving sons, we get a rare glimpse of this prolific inventor's working habits. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • User Innovation and Hacking

    Publication Year: 2008, Page(s):66 - 69
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1279 KB) | HTML iconHTML

    The economy's ongoing shift to user-centered innovation has some attractive qualities. Many users are finding it progressively easier to get precisely what they want by designing it for themselves. Innovation by users also provides a necessary complement to and source for novel products sold by producers. Users' innovations also seem to increase the welfare of society. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Hacking Tradition

    Publication Year: 2008, Page(s):70 - 71
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (405 KB) | HTML iconHTML

    This issue's works in progress department features a novel technology that embeds a six-degrees-of-freedom force-torque sensor into a physical artifact to transform existing 3D passive artifacts into contact-sensitive interface devices. The department also presents an approach for rewriting binary to better correlate application usage with contextual information. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Guaranteeing the Authenticity of Location Information

    Publication Year: 2008, Page(s):72 - 80
    Cited by:  Papers (11)  |  Patents (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1802 KB) | HTML iconHTML

    Location authentication is a young security requirement that has recently arisen in ubiquitous computing applications. During the last decade, researchers have proposed several schemes to guarantee this property in different contexts, but more research is needed. To provide a clearer picture of this requirement, the authors present a comprehensive definition of location authentication, describe it... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Bridging the Gap between Research and Industry

    Publication Year: 2008, Page(s):81 - 83
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (148 KB) | HTML iconHTML

    To close the gap between theory and application, industry needs ways to employ theoretical and scientific innovation in its applications. The consumer experience architecture (CEA) is a new framework for applying scientific insights to the development of products and services. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Careers.computer.org [advertisement]

    Publication Year: 2008, Page(s): 84
    Request permission for commercial reuse | PDF file iconPDF (490 KB)
    Freely Available from IEEE
  • Evaluating Pervasive and Ubiquitous Systems

    Publication Year: 2008, Page(s):85 - 88
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1522 KB) | HTML iconHTML

    Recognized evaluation strategies are essential to systematically advance a research field's state of the art. Pervasive and ubiquitous computing need such strategies to mature as a discipline and to enable researchers to objectively assess and compare new techniques' contributions. Researchers have shown that evaluating ubiquitous systems can be difficult, so approaches tend to be subjective, piec... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • PerCom 2009 Call for Papers Advertisement

    Publication Year: 2008, Page(s): c3
    Request permission for commercial reuse | PDF file iconPDF (228 KB)
    Freely Available from IEEE
  • ISWC 2008

    Publication Year: 2008, Page(s): c4
    Request permission for commercial reuse | PDF file iconPDF (706 KB)
    Freely Available from IEEE

Aims & Scope

IEEE Pervasive Computing explores the role of computing in the physical world–as characterized by visions such as the Internet of Things and Ubiquitous Computing. Designed for researchers, practitioners, and educators, this publication acts as a catalyst for realizing the ideas described by Mark Weiser in 1988.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Maria R. Ebling, Ph.D.
IBM T. J. Watson Research Center